PERIMETER 81 — SECURE REMOTE NETWORKS, BASED ON THE ZERO TRUST ARCHITECTURE
Zero Trust Network Access
Segmented and isolated network access
If employees are connected, they and your network are protected — with identity-based access rules, 2FA, traffic encryption, monitoring, and more.
Privatize traffic across all layers, ports and protocols
Picking only one encryption solution can cause issues when resources are located in various cloud environments and users connect with their preferred device and location. With Perimeter 81 you can deploy multiple protocols at once, depending on the relevant environment and connection.
Customized access policy for users and their devices
When all employees have the same access permissions and those permissions grant full network access, the attack surface is wide and vulnerabilities abound. Segment your network and narrow access rules to individual users and groups, with authentication enforced via identity providers.
Integrate security into every environment
When their companies rely heavily on the cloud, and encourage remote work and BYOD, a primary concern for IT is complexity and reduced visibility into network activity and access. Perimeter 81 integrates with all your various solutions and services for total network awareness.
Boost resource availability for remote workers
Now that the traditional network perimeter is gone and access occurs further away from network resources, it’s time to bring resources closer to where they’re needed. Private network gateways limit latency and boost speeds for productive and agile remote work no matter where your employees are located.
Business VPN
Security, privacy, and access in the cloud
Gain complete traffic encryption and more agile access policies, without the hardware or complexity involved in traditional solutions.
Encryption for every port and protocol
When critical resources are present across many cloud environments, one VPN protocol for your users will fail to cover all security gaps. Perimeter 81 allows you to deploy multiple protocols like IPSec and WireGuard at the same time for different resources and users.
Unique, secure access policies by use
The simplest thing you can do to protect your network is to segment critical resources and ensure that each user only has access to the resources relevant to them. Perimeter 81 relies on identity providers to login and automatically provide optimized access rules for users and groups.
Ensure security solutions cover all network resources
A primary concern for IT when their companies expand into the cloud, remote work, and BYOD is network complexity, which can obstruct the visibility of access and activity and risk security significantly. Perimeter 81 integrates with any solution or service for total network omniscience.
Maximize resource availability for remote employees
Cloud adoption is great for IT agility but it also means that sensitive resource access is happening further away than ever before. Security solutions must be closer to the action, and therefore Perimeter 81 enables easy deployment of VPN gateways, public or private, around the world.
Other Perimeter 81 services
Firewall as a Service
Control network access with Firewall as a Service. Easily create simple rules to protect your essential resources.
Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) is a blueprint for better business security and involves the combination of software-defined edge networking, user-focused authentication, and access control, and seamless integration across the cloud.
Secure Web Gateway
Create user or group-specific rules that determine which sites are blocked, warned against or allowed. With total admin control over Internet access, employees can safely browse the web while avoiding online threats.
Software-Defined Perimeter (SDP)
Design a flexible, stronger access policy playbook around user and device authentication with a Software-Defined Perimeter. Whether your critical corporate resources are in the cloud or local servers, SDP enables IT to easily build a wall around the entire network.
PACKAGES
ESSENTIALS
Cloud network management platform
Global private network
Agentless application access | 2 Applications
Zero Trust policy-based segmentation
Fast and easy network deployment
Unlimited data usage
Activity audits & reports | 14 days
Gateway performance | 500 Mbps/Gateway
Unlimited network tunnels
Site-to-Site interconnectivity
Split tunneling
Private DNS
Secure Web Gateway New | Add-On
Two-factor authentication
Easy-to-use apps
Wireguard protocol
Automatic Wi-Fi Security
PREMIUM
Cloud network management platform
Global private network
Agentless application access | 10 Applications
Zero Trust policy-based segmentation
Fast and easy network deployment
Firewall as a Service | 10 Policies
Unlimited data usage
Activity audits & reports | 30 days
Gateway performance | 1000 Mbps/Gateway
Unlimited network tunnels
Premium public network
Always-on VPN
Site-to-Site interconnectivity
Split tunneling
Private DNS
DNS Filtering
Secure Web Gateway New | Add-On
Two-factor authentication
Device Posture Check | 3 Profiles
Single Sign-On capabilities
Easy-to-use apps
Wireguard protocol
Automatic Wi-Fi Security
User Configuration Profiles | 3 Profiles
Disable Sign-Out
PREMIUM PLUS
Cloud network management platform
Global private network
Agentless application access | 100 Applications
Zero Trust policy-based segmentation
Fast and easy network deployment
Firewall as a Service | 100 Policies
Unlimited data usage
Activity audits & reports | 30 days
Gateway performance | 1000 Mbps/Gateway
Unlimited network tunnels
Premium public network
Always-on VPN
Site-to-Site interconnectivity
Split tunneling
Private DNS
DNS Filtering
Secure Web Gateway New | Add-On
Two-factor authentication
Device Posture Check | 20 Profiles
Single Sign-On capabilities
Easy-to-use apps
Wireguard protocol
Automatic Wi-Fi Security
User Configuration Profiles | 10 Profiles
Disable Sign-Out
SIEM Integration | Add-On
Dedicated Solution Architect
API Support
Softprom — IT Distributor
Softprom is a leading IT Distributor in Eastern & Central Europe, and the CIS with a portfolio of more than one hundred vendors.
The company was founded in 1999 and nowadays it is represented territory in more than 30 countries.
Our directions: Cyber Security, Cloud, IT Infrastructure, Video Security, CAD & Graphics.
Request demo
Request a consultation or demonstration, and try Perimeter 81 products now.